|
"lei c l"的相關文件
顯示項目 1-25 / 79 (共4頁) 1 2 3 4 > >> 每頁顯示[10|25|50]項目
臺大學術典藏 |
2021-03-04T06:45:06Z |
Assessing the Profitability of Timely Opening Range Breakout on Index Futures Markets
|
Tsai, Y.-C.; Wu, M.-E.; Syu, J.-H.; Lei, C.-L.; Wu, C.-S.; Ho, J.-M.; Wang, C.-J.; CHIN-LAUNG LEI |
臺大學術典藏 |
2021-03-04T06:45:06Z |
An independent three-factor mutual authentication and key agreement scheme with privacy preserving for multiserver environment and a survey
|
Chuang, Y.-H.; Lei, C.-L.; CHIN-LAUNG LEI |
臺大學術典藏 |
2021-03-04T06:45:06Z |
An improved key-agreement protocol for channels with small error rate
|
Guan, A.; Lei, C.-L.; CHIN-LAUNG LEI |
臺大學術典藏 |
2021-03-04T06:45:05Z |
POSTER: Construct macOS Cyber Range for Red/Blue Teams
|
Chen, Y.-H.; Lin, Y.-D.; Chen, C.-K.; Lei, C.-L.; Huang, C.-Y.; CHIN-LAUNG LEI |
臺大學術典藏 |
2021-03-04T06:45:05Z |
Cryptanalysis of Four Biometric Based Authentication Schemes with Privacy-preserving for Multi-server Environment and Design Guidelines
|
Chuang, Y.-H.; Lei, C.-L.; Shiu, H.-J.; CHIN-LAUNG LEI |
臺大學術典藏 |
2021-03-04T06:45:05Z |
Privacy protection for telecare medicine information systems with multiple servers using a biometric-based authenticated key agreement scheme
|
Lei, C.-L.; Chuang, Y.-H.; CHIN-LAUNG LEI |
臺大學術典藏 |
2021-03-04T06:45:05Z |
MigrateSDN: Efficient approach to integrate OpenFlow networks with STP-enabled networks
|
Chi, P.-W.; Wang, M.-H.; Guo, J.-W.; Lei, C.-L.; CHIN-LAUNG LEI |
臺大學術典藏 |
2020-06-11T06:51:27Z |
Firework search for location aided routing enhancement in mobile ad-hoc networks
|
Hsu, C.-C.;Lei, C.-L.; Hsu, C.-C.; Lei, C.-L.; CHIN-LAUNG LEI |
臺大學術典藏 |
2020-06-11T06:51:27Z |
Identifying MMORPG bots: A traffic analysis approach
|
Chen, K.-T.;Jiang, J.-W.;Huang, P.;Chu, H.-H.;Lei, C.-L.;Chen, W.-C.; Chen, K.-T.; Jiang, J.-W.; Huang, P.; Chu, H.-H.; Lei, C.-L.; Chen, W.-C.; CHIN-LAUNG LEI |
臺大學術典藏 |
2020-06-11T06:51:26Z |
Effect of network quality on player departure behavior in online games
|
Chen, K.-T.;Huang, P.;Lei, C.-L.; Chen, K.-T.; Huang, P.; Lei, C.-L.; CHIN-LAUNG LEI |
臺大學術典藏 |
2020-06-11T06:51:25Z |
An efficient password authentication scheme based on a unit circle
|
Liaw, H.-T.;Lei, C.-L.; Liaw, H.-T.; Lei, C.-L.; CHIN-LAUNG LEI |
臺大學術典藏 |
2020-06-11T06:51:24Z |
A dynamic cryptographic key assignment scheme in a tree structure
|
Liaw, H.T.;Wang, S.J.;Lei, C.L.; Liaw, H.T.; Wang, S.J.; Lei, C.L.; CHIN-LAUNG LEI |
臺大學術典藏 |
2020-06-11T06:51:22Z |
Uncovering Internal Threats Based on Open-Source Intelligence
|
Tsai, M.-H.;Wang, M.-H.;Yang, W.-C.;Lei, C.-L.; Tsai, M.-H.; Wang, M.-H.; Yang, W.-C.; Lei, C.-L.; CHIN-LAUNG LEI |
臺大學術典藏 |
2020-06-11T06:51:22Z |
An optimal algorithm to assign cryptographic keys in a tree structure for access control
|
Liaw, H.-T.;Lei, C.-L.; Liaw, H.-T.; Lei, C.-L.; CHIN-LAUNG LEI |
臺大學術典藏 |
2018-09-10T07:27:19Z |
Tame pool-based pairwise key predistribution for large-scale sensor networks
|
Liao, Y.-H.;Lei, C.-L.;Wang, A.-N.;Tsai, W.-C.; Liao, Y.-H.; Lei, C.-L.; Wang, A.-N.; Tsai, W.-C.; CHIN-LAUNG LEI; AI-NUNG WANG |
國立臺灣科技大學 |
2012 |
Computational procedure of optimal inventory model involving controllable backorder discounts and variable lead time with defective Units
|
Tsou, H.-H.;Lee, W.-C.;Wu, J.-W.;Lei, C.-L. |
國立政治大學 |
2009 |
Tame pool-based pairwise key predistribution for large-scale sensor networks
|
Liao, Y.-H.;Lei, C.-L. ; Tsai, Wen Chi; 蔡紋琦 |
淡江大學 |
2008-09 |
Computational procedure for assessing lifetime performance index of products for a one-parameter exponential lifetime model with the upper record values
|
Wu, J. W.; Lee, H. M.; Lei, C. L. |
國立臺灣大學 |
2005-06 |
The Security of Mobile E-Commerce
|
Lei, C. L.; Fan, Chun-I |
國立臺灣大學 |
2004 |
Divisible blind signatures based on hash chains
|
Fan, C. I.; Lei, C. L. |
國立臺灣大學 |
2001 |
Smart Card Payment Today and Tomorrow
|
Lei, C. L.; Yin, C. E. |
國立臺灣大學 |
2001 |
Fairness in E-cash Systems
|
Chen, H. J.; Lei, C. L.; Yu, P. L. |
國立臺灣大學 |
2001 |
Cryptanalysis on improved user efficient blind signatures
|
Fan, C.-I.; Lei, C.-L. |
國立臺灣大學 |
1999 |
Partially blind threshold signatures based on discrete logarithm
|
Juang, W. -S.; Lei, C. -L. |
國立臺灣大學 |
1999 |
Anonymous channel and authentication in wireless communications
|
Juang, W. -S.; Lei, C. -L.; Chang, C. -Y. |
顯示項目 1-25 / 79 (共4頁) 1 2 3 4 > >> 每頁顯示[10|25|50]項目
|